╔═╝╔═║╝╔╔ ╔╔ ║║║╔═║ ╔═║╔═╝
                        ║ ║╔╔╝║║║║║║║║║║╔═║ ╔╔╝╔═╝
                        ══╝╝ ╝╝╝╝╝╝╝╝══╝╝ ╝╝╝ ╝══╝   88           
            ,adPPYba,   8b,dPPYba,       ,adPPYba,   86,dPPYba,   
           a8"     ""   88P'    "8a      I8[    ""   88P'    "8a  
           8b           88       d8       `"Y8ba,    88       d8  
           "8a,   ,aa   88b,   ,a8"      aa    ]8I   88b,   ,a8"  
            `"Ybbd8"'   88`YbbdP"'       `"YbbdP"'   8Y"Ybbd8"'   
                        88                                           

|||----------------------------------------------------------------------------
||| The cyberpunk scrapbook is a collection of media I've collected together
||| either to editorialise or just because I thought it was interesting, but
||| largely thematically surrounding information and hardware, and our freedoms
||| to use both as we see fit.
|||----------------------------------------------------------------------------
||| CPSB uses grimmdex
||| grimmdex is a CMS which uses git-annex as a backend - this means that at
||| some point in the future it will be made available as a git repository for
||| easy offline viewing, accountability, and censorship resistant distribution.
||| grimmdex is also useful for privacy - if you want to see the original
||| content, click on the "view online" link which is the web remote for the
||| content. If you only want to trust grimmwa.re, click on the main content
||| link.
    
./articles/how-silicon-valley-is-erasing-your-individuality.html
  editorial=I'm not a big fan of Mark Zuckerberg - and to have moral aspersions 
such as “Having two identities for yourself is an example of a lack of 
integrity.” cast upon me by a man who is only saying that because he 
thinks it will remake the world in his image and put money in his pocket is 
pretty galling. This article covers all manner of evils that we suck up in the 
name of convenience, neatly sidestepping the pragmatisms of what it is to be 
human in order to better fit with the assumptions of some rather well populated 
data models.
  timestamp=1505043955
  view online: https://www.washingtonpost.com/outlook/how-silicon-valley-is-erasing-your-individuality/2017/09/08/a100010a-937c-11e7-aace-04b862b2b3f3_print.html

./documents/fbi_cell_tracking.pdf
  editorial=A non-disclosure document from the FBI telling police that, yes 
they can use their phone tracking but no, it won't be admissible in court so 
they'll need to recreate the evidence some other way. So like, probable cause?
  timestamp=1462791482
  view online: http://oklahomawatch.wpengine.netdna-cdn.com/files/2016/04/OKCPDFBI-MOU.pdf

./videos/Last_Week_Tonight_with_John_Oliver_-_Encryption-zsjZ2r9Ygzw.mp4
  editorial=John Oliver talks about how the plucky optimism of US lawmakers 
advocating encryption with a magic government key is very much like saying "you 
can lick your own elbow if you really believe in yourself" whilst neatly 
sidestepping the realisation that you would have to break your arm first.
  timestamp=1458143196

./videos/How_to_send_an__E_mail____Database___1984.mpeg
  editorial=In which Pat and Julian Green get gently flustered whilst 
demonstrating how to send an email in 1984, and a BBC Micro program plays out 
(in audio) over the end credits. You can load up the program by playing back 
the tape of the program you recorded on your VCR coupled up to your Micro. 
Bonus points for Julian's arm appearing to type something whilst Pat is being 
interviewed.
  timestamp=1458142749
  view online: https://www.youtube.com/watch?v=szdbKz5CyhA

./audio/transcripts/encryption_and_privacy_are_larger_issues_than_fighting_terrorism-richard_clarke.txt
  editorial=transcript for 
audio/encryption_and_privacy_are_larger_issues_than_fighting_terrorism-richard_c
larke.mp3
  timestamp=1458045029

./audio/encryption_and_privacy_are_larger_issues_than_fighting_terrorism-richard_clarke.mp3
  editorial=In which Richard Clarke (head of counterterrorism for two US 
administrations) not only tells NPR that encryption and privacy are larger 
issues than fighting terrorism, but also told the presenter "No, David. If I 
were in the job now, I would have simply told the FBI to call Fort Meade, the 
headquarters of the National Security Agency, and NSA would have solved this 
problem for them. They're not as interested in solving the problem as they are 
in getting a legal precedent." Which sounds about right. Transcript at 
audio/transcripts
  timestamp=1458044808
  view online: http://pd.npr.org/anon.npr-mp3/npr/me/2016/03/20160314_me_encryption_and_privacy_are_larger_issues_than_fighting_terrorism_clarke_says.mp3
http://pd.npr.org/anon.npr-mp3/npr/me/2016/03/20160314_me_encryption_and_privacy_are_larger_issues_than_fighting_terrorism_clarke_says.mp3?dl=1

./documents/keys_under_doormats.pdf
  editorial=An MIT AI Lab report detailing what should be patently obvious but 
governments don't appear to give much of a shit about - by mandating backdoors 
you fundamentally weaken security going forwards
  timestamp=1457714400
  view online: https://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf

./articles/alt.cyberpunk_faq.txt
  editorial=Last edited in 1994, this is the faq for the alt.cyberpunk usenet 
group. It reads very much like a 90s FAQ about cyberpunk and is, as such, 
totally awesome. Makes me feel sorry for Billy Idol.
  timestamp=1444146146
  view online: http://textfiles.com/sf/cyberfaq

./articles/The_Impact_of_Mobile_Network_Shutdowns_Case_Study.pdf
  editorial=A case study by the Institute for Human Rights and Business as part 
of digitaldangers.org, this study looks at the impact of government mandated 
communications network shutdowns using Telenor Pakistan as a focus. It's pretty 
in-depth, so make yourself comfortable first!
  timestamp=1443700324
  view online: http://www.ihrb.org/pdf/2015-09-Telenor-Pakistan-Case-Study.pdf

./documents/dea_consent_to_assume_online_identity_form.pdf
  editorial=This one's short and sweet - a single page of the 1999 handbook 
Online Investigative Principles for Federal Law Enforcement Agents which had 
previously been available online anyway, apart from this page released as part 
of a FOIA request by aclu.org. This is the form that the DEA might ask you to 
sign if they want to take your online identity from you to gather evidence on 
your friends.
  timestamp=1441371229
  view online: https://www.aclu.org/sites/default/files/field_document/2015.07.27_-_dea_lea_handbook_new_pages.pdf

./documents/software_security_requirements_for_u-nii_devices.pdf
  editorial='What prevents third parties from loading non - US versions of the 
software/firmware on the device? Describe in detail how the device is protected 
from flashing and the installation of third - party firmware such as DD-WRT.' 
- wow. Just wow. This is apparently how you protect consumers from themselves. 
We're basically talking wifi devices here. Basically fuck consumers who want to 
install their own software on their own hardware. Good job manufacturers have 
historically been so shit at it.
  timestamp=1440965362
  view online: https://apps.fcc.gov/kdb/GetAttachment.html?id=1UiSJRK869RsyQddPi5hpw%3D%3D&desc=594280%20D02%20U-NII%20Device%20Security%20v01r02&tracking_number=39498

./documents/CryptoAG-1954-unredacted.pdf
  editorial=See [document/CryptoAG-1954-redacted.pdf]
  timestamp=1438092108
  view online: https://www.nsa.gov/public_info/_files/friedmanDocuments/ReportsandResearchNotes/FOLDER_109/41741409078064.pdf

./documents/CryptoAG-1954-redacted.pdf
  editorial=One half of the unclassified NSA document showing that in 1954 they 
had some fingers in the encryption pies, receiving certain information from the 
company Crypto AG over what countries were buying which models of their crypto 
machines. In hilarious hardcopy fashion, this document paired with 
[documents/CryptoAG-1954-unredacted.pdf] can be cross referenced to build a 
more complete text. Left as is because it's funnier like that.
  timestamp=1438091935
  view online: https://www.nsa.gov/public_info/_files/friedmanDocuments/CorrespondenceMemorandaandPersonnelFileRecords/FOLDER_117/42035009107382.pdf

./books/deep_lab.pdf
  editorial=Deep Lab is (to summarise, probably poorly) a collective of 
artists, hackers and reasearchers - all female - who aim to explore digital 
culture and the deep web. This particular document aims to explore encryption 
and privacy in the 'post-snowden' era.
  tag=book
  timestamp=1437942255

./videos/dont_copy_that_floppy.mkv
  editorial=I still can't even. Talk about flogging a dead horse. Nothing's 
cooler to kids than a man rapping for FUCKING HOURS whilst wearing a leather 
trilby and then being lectured by some really badass looking developers. I'm 
not saying I agree or disagree with the point - I'm just pointing out that 
making piracy "uncool" has always been the weapon of choice, from here to Tidal.
  tag=video
  timestamp=1437576731
  view online: http://youtube.com/embed/up863eQKGUI

./articles/steve_albini_music_and_the_internet.md
  editorial=This caught my eye because it talks about how our consumption of 
media is no longer limited by the 'media' that it lives on - suffice to say 
distribution no longer needs a middle man so the middle man is in his death 
throes. Also talks about how artists will have to make their money through live 
performance rather than records
  tag=article
  timestamp=1437576731